Inspecting the source code I notice the hidden directory nibbleblog:
So I decided to perform some enumeration using dirsearch ๐:
So I checked the admin.php file:
After some typical combination, none got me inside, so I decided to check the other findings. The one who got me up was update.php:
So can I read private files? That gave me an idea: I could inspect the http://nibbles.htb/nibbleblog/content/private/ directory and maybe find some creds:
The one which was more interesting was users.xml:
Now we know that there is a user called admin
Exploitation
Then i decided to search for โnibbleblog cveโ and found CVE-2015-6967. BTW it seems that common creds to use are admin:nibbles. I tried them and worked:
So I cloned the repo and executed the exploit to get a reverse shell:
Now I can read the user flag:
Privilege Escalation
If we run:
So we can create that file with the following content: